Skip to content

SEC - Introduction to information security testing

A video for information security testing can be found on panopto.

About service production and security - Valu Digital Oy

About Software Library/Component Quality Metrics

There is lot's of software components and librarys available for developer around the internet. Important question from security point of view is which one of them are trustworthy enough? Commonly software library componets are development and delivered as projects eg. Github and needed source files/packages are easily to download to be integrated as part of development environment. What if some of external sources are affected by "Evil forces"?

Sonatype as company provides material, methods and tools to monitor your component sources as part of your development line

How to detect level of trustworthy and security inside component development project?

About Supply-chain and Open Source

Information security controls

There are many different types of information security controls and they are covered in more depth in advanced courses. These controls are held at the international level by many parties, but there are also Finnish models. In this case, we will get to know only one of the most used CIS controls. You can familiarize yourself with CIS controls here: https://www.cisecurity.org/controls/cis-controls-navigator/, in this project we do not of course go ahead and implement all of this. First of all, let's look at only the requirements of implementation group 1, from which we will extract the most important points for the project in the manufacturing phase. There are even scanners and automation for CIS controls, but these tools are not necessarily effective when packaged in separate parts. I created a list that could have a few points that you could look at with thought:

CIS Control CIS safeguard Asset type Title
1 1,1 Devices Establish and Maintain Detailed Enterprise Asset Inventory
2 2,1 Applications Establish and Maintain a Software Inventory
5 5,1 Users Establish and Maintain an Inventory of Accounts
5 5,2 Users Use Unique Passwords
5 5,4 Users Restrict Administrator Privileges to Dedicated Administrator Accounts
7 7,1 Applications Establish and Maintain a Vulnerability Management Process
7 7,3 Applications Perform Automated Operating System Patch Management
7 7,4 Applications Perform Automated Application Patch Management
8 8,1 Network Establish and Maintain an Audit Log Management Process
8 8,2 Network Collect Audit Logs
8 8,3 Network Ensure Adequate Audit Log Storage
9 9,2 Network Use DNS Filtering Services
11 11,1 Data Establish and Maintain a Data Recovery Process
11 11,2 Data Perform Automated Backups
11 11,3 Data Protect Recovery Data
11 11,4 Data Establish and Maintain an Isolated Instance of Recovery Data